Sponsored by Spectra Cyber Security Solutions
————————————————————————
26 Oct 17. CryptoniteNXT Moving Target Cyber Defense (MTD) Takes the Battle Back to the Attackers. Cryptonite, a leader in moving target cyber defense, launched today from stealth mode with the release of the company’s flagship network security solution, CryptoniteNXT. CryptoniteNXT enables any network to actively shield itself from cyber attacks by preventing all attacker reconnaissance and lateral movement. By challenging traditional trust assumptions, CryptoniteNXT proactively contains an attack well before it can be detected and removed by traditional means.
“CryptoniteNXT was built with defensive security in mind that can be applied to critical vulnerability use cases and protect against any level of adversary,” said Justin Yackoski, CTO, Cryptonite. “The network has become an easily infiltrated space that cannot be completely locked down. With CryptoniteNXT, we take away the attackers’ ability to ‘see’ within the network, making network attacks or data exfiltration attempts significantly more difficult and expensive for attackers.”
Research and development into Cryptonite’s ground breaking MTD technology started with funding from DoD and DHS. Spun out of a Maryland defense contractor, Intelligent Automation, Inc. (IAI), Cryptonite is led by Michael Simon, serial technology entrepreneur and President & CEO, and Justin Yackoski, former lead researcher at IAI and CTO. With a heritage in the defense space and a DC-bred team, Cryptonite is backed by cybersecurity investors, including Ron Gula, founder of Tenable, David Walker, founder of Pangia Technologies, Al Nardslico, founder of SMS, Abtin Buergari, founder of Modus eDiscovery, Don Rogers, co-founder of Shulman Rogers, and Dr. Leonard Haynes, co-founder of IAI.
“Cryptonite uniquely prevents adversaries from exfiltrating actionable information from networks. The other key capability is their fine-grained micro-segmentation which stops east-west traffic that has enabled the spread of ransomware,” said Ron Gula, principal at Gula Tech Adventures.
CryptoniteNXT is delivered as a network appliance that supplements existing network infrastructure to improve both wired and wireless security. A unique combination of technologies effectively alters network behavior in real time with no human intervention. CryptoniteNXT blocks malicious activities while at the same time preserving performance and usability for legitimate purposes. Network protection with CryptoniteNXT is therefore always on, checking that every packet is not exceeding necessary business functions, and limiting the attacker’s ability to progress along the Cyber Kill Chain.
(Source: BUSINESS WIRE)
26 Oct 17. In first, DIUx hands off cyber pilot project to Army. The Pentagon’s commercial technology hub has successfully transitioned a program from pilot to full-blown contract, a milestone for the 2-year-old office.
The Defense Innovation Unit Experimental, or DIUx, moved a pilot program with commercial cybersecurity firm Tanium into a $750m, five-year contract with the U.S. Army. That contract was signed Sept. 26.
Tanium provides endpoint (think laptops or desktops) cybersecurity monitoring for large-scale clients. While Tanium works with a number of major financial institutions, the U.S. Army requirement marks the company’s largest single-user base — up to 1 million endpoints under the contract.
If a bug or hack is found on one system, Tanium can run a search across all users in roughly 15 seconds, discovering where the vulnerability spread, explained Ralph Kahn, Tanium’s vice president for federal affairs at the company. And because Tanium keeps historic data, it can go backward and look for where the vulnerability first appeared as well as discover the impact it had on the infected system.
The contract is structured as a one-year guarante